{"id":2720,"date":"2026-02-10T10:23:00","date_gmt":"2026-02-10T10:23:00","guid":{"rendered":"http:\/\/pelincayonu.info\/videobased\/?post_type=portfolio-item&#038;p=2720"},"modified":"2026-03-26T07:24:56","modified_gmt":"2026-03-26T07:24:56","slug":"cyber-security-animated-explainer-video","status":"publish","type":"portfolio-item","link":"http:\/\/pelincayonu.info\/videobased\/portfolio-item\/cyber-security-animated-explainer-video\/","title":{"rendered":"Cyber Security animated explainer video"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":2721,"template":"","filters":[41,26],"class_list":["post-2720","portfolio-item","type-portfolio-item","status-publish","has-post-thumbnail","hentry","filters-a-motiongraphics","filters-video"],"aioseo_notices":[],"acf":[],"_links":{"self":[{"href":"http:\/\/pelincayonu.info\/videobased\/wp-json\/wp\/v2\/portfolio-item\/2720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/pelincayonu.info\/videobased\/wp-json\/wp\/v2\/portfolio-item"}],"about":[{"href":"http:\/\/pelincayonu.info\/videobased\/wp-json\/wp\/v2\/types\/portfolio-item"}],"version-history":[{"count":3,"href":"http:\/\/pelincayonu.info\/videobased\/wp-json\/wp\/v2\/portfolio-item\/2720\/revisions"}],"predecessor-version":[{"id":3905,"href":"http:\/\/pelincayonu.info\/videobased\/wp-json\/wp\/v2\/portfolio-item\/2720\/revisions\/3905"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/pelincayonu.info\/videobased\/wp-json\/wp\/v2\/media\/2721"}],"wp:attachment":[{"href":"http:\/\/pelincayonu.info\/videobased\/wp-json\/wp\/v2\/media?parent=2720"}],"wp:term":[{"taxonomy":"filters","embeddable":true,"href":"http:\/\/pelincayonu.info\/videobased\/wp-json\/wp\/v2\/filters?post=2720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}